Sciweavers

ICAI
2009
13 years 10 months ago
Autonomic Self-Healing for MANETs
Junaid Ahsenali Chaudhry, Yonghwan Lee, Ken R. Pen...
ADT
2006
14 years 11 days ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
ECUMN
2007
Springer
14 years 6 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...